Threat actors are learning from ransomware attacks such as WannaCry by adding a features like a worm module to their malware.
With the right network insights, analysts can deal with existing threats such as WannaCry, and quickly detect and respond to new attacks as they emerge.
IBM X-Force Malware Analysis enables security teams to examine potentially problematic files, prioritize events and respond to threats quickly.
IBM X-Force revealed that WannaCry spread to its targets like a computer worm. But unlike a classic worm, it carried a malicious payload of ransomware.
Kapersky Labs explained that the life of a computer worm exploit doesn't end with the release of a security patch. Stuxnet is one example.
Hajime appears to have been created by a vigilante that is attempting to improve IoT device security and help IT decision-makers tighten defenses.
What's worse than ransomware? Ransomworms. Evolving crypto-ransomware techniques could wreak havoc on the IT security landscape in 2017.
A new malware called ZCryptor was recently found to be leveraging attack techniques that resemble worms, making it the first case of a ransomworm.
Android smartphones are being hit with text messages promising an Amazon gift card, but it's really a way for cybercriminals to install mobile malware.